Search Results (131 titles)

Searched over 21.6 Million titles in 0.31 seconds

Refine Your SearchRefine Your Search
 
English (X) Authors Community (X) Technology (X)

       
3
|
4
|
5
|
6
|
7
Records: 101 - 120 of 131 - Pages: 
  • Cover Image

Preventing Catastrophe : US Policy Options for Management of Nuclear Weapons in South Asia

By: Lieutenant Colonel Martin J. Wojtysiak,USAF

In Preventing Catastrophe: US Policy Options for Management of Nuclear Weapons in South Asia, Lt Col Martin J. “Marty” Wojtysiak, USAF, proposes a response to the dangerous proliferation of nuclear weapons in India and Pakistan. This paper highlights the threat in “The Nuclear Catastrophe of 2005,” a gripping projection of the worstcase scenario on the current realities of the Indian subcontinent. Written a year after the “catastrophe,” it vividly describes the events leading up to the disaster as well as the grim aftermath of a South Asian nuclear war. The remainder of the paper looks at US regional objectives and suggests how they might be achieved. The author proposes a regional proliferation regime that realistically addresses the threat and moves the United States to a pragmatic approach to manage and limit the ongoing proliferation in South Asia....

Read More
  • Cover Image

The F-22 : The Right Fighter for the Twenty-first Century?

By: Michael J. Costigan

In this study Lt Col Michael J. Costigan, USAF, takes a critical look at the F-22 and its role in our military strategy in the twenty-first century. Its innovative technologies provide the F-22 with supercruise, stealth, and integrated avionics, and enable it to guarantee the air superiority so necessary to victory....

Read More
  • Cover Image

The Influence of Politics, Technology, and Asia on the Future of US Missile Defense

By: Lt. Col. Jeffrey T. Butler, USAF

Missile defense has become a key factor in US strategic planning. The problem, of course, lies with the stage of current technological development. Mid-course or terminal-phase systems appear closer to feasibility just now, at least theoretically....

1 Introduction . . . . . . . . . . . . . . . . . . . . . . 1 Note . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 2 Déjà vu All Over Again . . . . . . . . . . . . . . .5 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3 Evaluation of Current National Missile-DEFENSE PROGRAMS . . . . . . . . . . . . . . . . 19 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 4 Asia and the US Missile-defense Program . . . . . . . . . . . . . . . . . . . . . . . . . 35 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .51 5 Conclusions . . . . . . . . . . . . . . . . . . . . . 53 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .70 ACRONYMS . . . . . . . . . . . . . . . . . . . . . . . 71 BIBLIOGRAPHY . . . . . . . . . . . . . . . . . . . . 73...

Read More
  • Cover Image

The US Response to China’s ASAT Test : An International Security Space Alliance for the Future

By: Lt Col Anthony J. Mastalir, USAF

Lt Col Anthony Mastalir has done policy makers a welcome service by exploring the enigma wrapped in a conundrum which is Chinese space policy, focusing on the Chinese kinetic energy antisatellite (KE-ASAT) test of January 2007. That test ended a de facto moratorium on KE-ASAT tests which the United States and Russia had observed for over two decades. It also announced the arrival of a new player in strategic space, forcing a reevaluation of US capabilities in space as well as Chinese intentions there. Colonel Mastalir examines both that reevaluation and those intentions, relying on open-source material, particularly from Chinese strategic and military analysts....

1 INTRODUCTION . . . . . . . . . . . . . . . . . . . 1 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .11 2 EXTREME DIMENSIONS . . . . . . . . . . . . . . 15 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .22 3 POLITICAL/DIPLOMATIC DIMENSION . . . . 25 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 42 4 INFORMATION DIMENSION . . . . . . . . . . . 47 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .59 5 ECONOMIC DIMENSION . . . . . . . . . . . . . 61 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .71 6 MILITARY DIMENSION . . . . . . . . . . . . . .75 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .86 7 FINDINGS/CONCLUSION . . . . . . . . . . . . .89 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 98 ABBREVIATIONS . . . . . . . . . . . . . . . . . . . 101 BIBLIOGRAPHY . . . . . . . . . . . . . . . . . . . .103...

Read More
  • Cover Image

GPS Versus Galileo : Balancing for Position in Space

By: Scott W. Beidleman

This study investigates Europe’s motives to develop the independent satellite navigation system known as Galileo despite the existence of America’s successful global positioning system (GPS). The study begins by analyzing both systems to familiarize the reader with global navigation satellite systems (GNSS) and to provide an understanding of the strengths and weaknesses of GPS and Galileo, as well as the systems’ similarities and differences. Although the two systems have different founding principles, they employ similar infrastructures and operational concepts. In the short term, Galileo will provide better accuracy for civilian users until GPS upgrades take effect. But performance is only part of the rationale. The author contends that Europe’s pursuit of Galileo is driven by a combination of reasons, including performance, independence, and economic incentive. With Galileo, Europe hopes to achieve political, security, and technological independence from the United States....

DISCLAIMER . . . . . . . . . . . . . . . . . . . . . . .ii FOREWORD . . . . . . . . . . . . . . . . . . . . . . .vii ABOUT THE AUTHOR . . . . . . . . . . . . . . . . .ix ACKNOWLEDGMENTS . . . . . . . . . . . . . . . . .xi 1 INTRODUCTION . . . . . . . . . . . . . . . . . . . 1 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2 GPS VERSUS GALILEO . . . . . . . . . . . . . . .11 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .27 3 WHY GALILEO? . . . . . . . . . . . . . . . . . . .31 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .45 4 IMPLICATIONS AND RECOMMENDATIONS . .51 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 66 ABBREVIATIONS . . . . . . . . . . . . . . . . . . . .69 BIBLIOGRAPHY . . . . . . . . . . . . . . . . . . . . 71 Illustrations 1 Satellite geometry 9 2 Global positioning system (GPS) satellite 14 3 Galileo satellite 16 Table 1 Number of visible satellites for various masking angles . . . . . . . . . . . . . . . . . . . .13...

Read More
  • Cover Image

Trendsiters Digital Content and Web Technologies

By: Sam Vaknin

Essays dedicated to the new media, doing business on the web, digital content, its creation and distribution, e-publishing, e-books, digital reference, DRM technology, and other related issues....

Read More
  • Cover Image

A New and Simple Concept for the Analysis of Nonlinear Heat Transfer Phenomena Such as Boiling, British Chemical Engineering, Dec 1965, Pp 840-845

By: Adiutori, Eugene F.

A New and Simple Concept for the Analysis of Nonlinear Heat Transfer Phenomena Such as Boiling, British Chemical Engineering, Dec 1965, pp 840-845

Read More
  • Cover Image

A Critical Examination of the View That Nucleate Boiling Heat Transfer Data Exhibit Power Law Behavior, Japanese Society of Mechanical Engineers International Journal, Series B, Vol. 37, No. 2, 1994, Pp 394-402

By: Eugene F. Adiutori

A Critical Examination of the View that Nucleate Boiling Heat Transfer Data Exhibit Power Law Behavior, Japanese Society of Mechanical Engineers International Journal, Series B, Vol. 37, No. 2, 1994, pp 394-402...

Read More
  • Cover Image

Air National Guard Structure for the Twenty-first Century : The Multimission Framework for Total Force Integration

By: Kevin S. Dailey

The Multimission Framework for operational integration proposed by Colonel Dailey is a synthesis of the successful constructs across the many models currently being utilized throughout the Total Force. Current models in vogue are the Active Associate Wing, the reserve/Guard Associate Wing, the “Blended” Wing, and the Integrated Wing. Colonel Dailey examined each of these models for its positive and negative contributions to the Total Force. His research presented an ironic challenge: all of them work to varying degrees of success when coupled with good leaders and good people. Can history and research demonstrate a better way forward?...

Read More
  • Cover Image

Credit Card Customer Segmentation : Essential First Step for a Profitable Credit Card Customer Portfolio

By: Forte Wares

300 billion credit card transactions are expected to take place each year by 2018, creating 300 billion opportunities to understand customers better. Unfortunately, many banks remain ignorant of this wealth of information at their disposal, and they opt for mass marketing and costly above-the-line communications....

Read More
  • Cover Image

Letter to Aunt Ofelia : Seven Proposals for Human Development Using New Information and Communication Technologies

By: Ricardo Gómez, Benjamin Casadiego Cabrales

The paper has been drafted in the form of a letter to an imaginary aunt who has recently been appointed Secretary of Communications in a Latin American country. This device allows for a creative approach to discussing issues and proposals for taking better advantage of the opportunities offered by information and communication technologies (ICTs) for human development in the region....

“A person waking up today from a hundred years' sleep would get quite a fright. Many things would have changed, but I think the most shocking impression would be that the world has become much smaller. Not only can we travel around the globe in much less than 80 days, but money and information can do so in seconds. Markets, wars and products are all becoming globalized, as are environmental impacts and the circulation of ideas”. ...

1. Offer concrete solutions 2. Move forward at the pace of the community 3. Learn from mistakes 4. Localize globalized communication 5. Work with a gender perspective 6. Let people speak with their own voice 7. Generate new knowledge ...

Read More
  • Cover Image

Process Performance Models : Statistical, Probabilistic & Simulation

By: Team Vishnuvarthanan Moorthy; Thirumal Sunil Snehal, Editor

Explains the various techniques of PPM development, simulation and optimization. All the explanations are given with IT industry and usage of alternate techniques to build PPM to suit even smaller organizations. Application of Statistical, Probablistic and Simulation models are elaborated. ...

Modelling in CMMI What are the Characteristics of a Good PPM? The role of Simulation & Optimization Types of Models - Definitions Tree of Models Process of Modelling Modelling under our purview Regression Regression - Steps Regression - Example Validating model accuracy Variants in Regression Tools for Regression Bayesian Belief Networks Bayesian Belief Networks- Steps Bayesian – Sample Bayesian Tools Neural Network Neural Networks - Steps Neural Networks - Sample Neural Network Tools Reliability Modelling Reliability Modelling- Steps Reliability Modelling- Sample Reliability Modelling- Tools Process Modelling (Queuing System) Process Modelling -Steps Process Modelling -Validation Process Modelling -Tools Fuzzy Logic Fuzzy Logic- Sample Fuzzy Logic – Sample Monte Carlo Simulation Monte Carlo Simulation- STEPS Monte Carlo Simulation- SAMPLE Monte Carlo Tools Model Selection – Thought Key Characteristics to determine model References Thanks to Team Screenshots Contribution From Connect To Us ...

Read More
  • Cover Image

The Military–Media Clash and the New Principle of War : Media Spin

By: Lieutenant Colonel Marc D. Felman, USAF

This paper briefly traces the evolution of the military/media clash and identifies the Vietnam War as the turning point where mutual trust seemed to be permanently damaged. Government and military leadership pathologies combined with press distortions to leave the impression on the world stage that American wars could be won or lost in the news media. Right or wrong, the effects of a war perceived to be lost in the media, precipitated media safeguards to insure military campaigns in Grenada and Panama would not be lost on television news. While these safeguards and press controls became somewhat tempered by the time of the Gulf War, the Rubicon had been crossed. Military commanders could never again afford to ignore the way combat operations would be portrayed in the news media. This essential consideration for any would-be combat commander constitutes the new principle of war: media-spin....

Read More
  • Cover Image

Cloud Memoirs: Views from Below, Inside, and Above; A look at the history of cloud computing by CohesiveFT team, industry experts, and early adopters

By: Margaret Walker; Ryan Koop, Patrick Kerpan, Fred Hoch, Edmund Sutcliffe, Krishnan Subramanian, James Elwood, Chad Lawler, and Patricia Seybold.

CohesiveFT sifted through our blog posts from 2006 onward, without any editorial updates (although tempted), in order to present the posts as a reflection of ours and some of our colleagues’ thoughts at the time. Interspersed with each chapter are new, exclusive insights from friends, colleagues, and customers we met along the journey. Each chapter looks back at the short history of cloud computing from the early stages where clouds were far off, through the gathering clouds that turned into fog. Today that fog is shifting, and beginning to rain down the first drops of change....

Exclusive Viewpoint: Cloud Still Has a Long Way to Come Chad Lawler Director, Consulting Services, Cloud Computing at Hitachi Consulting It’s very interesting to look ahead and try to anticipate where the puck is going. The truth is that what Werner Vogels has stated about where we are in the “maturity curve” is absolutely true – that even with the progress we’ve made, we are very early in the cloud evolution. We want instant gratification with a solution that fits all of our needs, but we’re not there yet. We’re certainly not at the point where true utility computing is a reality. Here is an example: most cloud vendors say they offer pay-per-use functionality, when really they’re offering pay-per-allocation. You allocate a small, medium, large, or extra-large compute size, server memory, and a certain amount of storage. You pay for what you allocate, not what you use. When you allocate 10TB of storage on AWS S3 and do not use all of it, you still pay for the 10TB allocated. In order to have scalable storage you still have to pay to allocate it. The idea of utility computing is still very relevant, interesting...

Clouds on the Horizon: 2006 - 2008 Founders’ Stories Exclusive Viewpoint: The Beginning of CohesiveFT and the Cloud Welcome to the Elastic Server Beta CohesiveFT's Elastic Server All at once I saw a crowd InfoWorld's top 10 tech startups for 2008 CloudCamp London: the inauguration Win Win for Independent Software Vendors Software Manufacturing: A CFT White Paper Cloud Cover: 2008 - 2009 Exclusive Viewpoint: History and Transformation of the Cloud Exclusive Viewpoint: Using CohesiveFT and AWS to Prove Cloud Concepts We're #1, (and #2, kind of #3, and #6, and part of #10) VPN Cubed – Cloud is Ready for the Enterprise 6CohesiveFT VPN-Cubed: Not Your Daddy's Encrypted Tunnel 2009 in Virtualization and Cloud Computing: The Year of the Virtualization Professional Fog Surrounds Cloud: 2009 - 2012 Exclusive Viewpoint: Cloud Computing: Past, Present and Future Exclusive Viewpoint: White Knight Solutions from CohesiveFT New VPN-Cubed Version and The Cloud Connectivity Market 2010 in Cloud Computing: GAME ON! Getting out of the weeds Welcome to the User-Cloud (Part 1) Welcome to the User-Cloud (Part 2) AMQP – the encha...

Read More
  • Cover Image

Benign Weather Modification

By: Major Barry B. Coble, USAF

This study examines one aspect of weather modification, benign weather modification (BWM), for possible use in assisting military operations. After briefly reviewing the history and science of weather modification, this thesis bounds the aspects of weather modification being addressed. It then describes barriers to BWM,showing how they affect current weather modification policy in the military. Examples are shown of current civilian BWM techniques, their possible use by the military, and some military-unique needs for weather modification....

INTRODUCTION . . . . . .1 AN OVERVIEW OF WEATHER MODIFICATION . . . . . . 7 BARRIERS TO WEATHER MODIFICATION. . . . . 13 MILITARY APPLICATIONS OF WEATHER MODIFICATION . .21 CONCLUSION AND RECOMMENDATIONS. . . . . .29 BIBLIOGRAPHY . . . .33...

Read More
  • Cover Image

The GPS and Galileo : Friendly Foes?

By: Lt. Col. Roftiel Constantine, USAF

In GPS and Galileo: Friendly Foes?, Lt Col Roftiel Constantine, United States Air Force (USAF), analyzes the heated competition to provide service from high in the skies of medium earth orbit. The European Union (EU) is developing Galileo, its own global positioning and navigation satellite system, scheduled to be operational by 2010. The EU states that Galileo will provide greater precision to all users than is currently available from the United States’ (US) global positioning system (GPS) through improved coverage of satellite signals at higher latitudes, and, unlike GPS, Galileo will be guaranteed to be always available—even during war or political disagreement. Regarding the enormous importance of GPS to the United States and millions of users worldwide, the prospect of a second, competing, and potentially interfering global satellite navigation system could have serious military, foreign policy, and industrial implications. The US government would benefit from the heightened awareness of the risks and opportunities Colonel Constantine presents for the United States surrounding the Galileo program....

1 INTRODUCTION TO THE GPS AND GALILEO PROGRAMS . . . . . . . . . . . . . . . . . .1 2 HISTORY OF SATELLITE NAVIGATION . . . . . 3 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3 GALILEO . . . . . . . . . . . . . . . . . . . . . . . .21 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 4 GEOPOLITICAL PERSPECTIVES . . . . . . . . .35 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 5 FIVE STEPS THE US GOVERNMENT SHOULD UNDERTAKE . . . . . . . . . . . . . . . . . . . . . . 43 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 6 CONCLUSION . . . . . . . . . . . . . . . . . . . . 51 ABBREVIATIONS . . . . . . . . . . . . . . . . . . . .53 BIBLIOGRAPHY . . . . . . . . . . . . . . . . . . . . 55...

Read More
  • Cover Image

Taking Down Telecommunications

By: Major Gerald R. Hust, USAF

Information is one of the most, if not the most, essential elements of combat capability. Because telecommunications affects every aspect of a society, and is probably the most important medium which military information is exchanged, this thesis provides an understanding of the telecommunications system and how best to exploit it across the spectrum of conflict. I examine the system’s vulnerabilities to both lethal and nonlethal attack mechanisms. While the ability to employ nonlethal technologies are currently limited, I recommend pursuing a strong research and development program to acquire this capability. The reason is that they provide additional policy options to deal with conflict, they are cheap, and because research may not only discover unanticipated capabilities for the US, but also identify countermeasures to protect our own systems. This thesis concludes by offering guidelines to help determine whether to exploit telecommunications with either lethal or nonlethal attack strategies....

1 INTRODUCTION . . . 1 Notes . . . 3 2 TELECOMMUNICATIONS . . . . . 5 The Modern Communications System . . . . . 6 Vulnerability Analysis . . . . . . 17 Targeting . . . . 23 Quantification . . . . . 29 Conclusion . . . 32 Notes . . . 35 3 DISABLING WEAPONS . . . . . . 38 Definition . . . . . 39 History And Legal Considerations . . . . . 41 Conventional And Disabling Kill Mechanisms . . . 44 Advantages/Disadvantages . . . . . . 49 Conclusion . . . . 53 Notes . . . . 55 4 GUIDANCE FOR CAMPAIGN PLANNING . . . . . . 57 Planning Factors . . . . 57 Conclusion . . . . . 61 Notes . . . . . 62...

Read More
  • Cover Image

Wright Flyer Paper : Waste to Watts and Water; Enabling Self-Contained Facilities Using Microbial Fuel Cells, Vol. 37

By: Major Amanda Sue Birch, P. E., USAF

Lack of investment in future agile combat-support technologies could lead to a strategic surprise that diverts military attention and resources from critical air, space, and cyber operations. Looking to the national security environment in 2030, this research explores one technology—the microbial fuel cell (MFC)—that gives life to self-contained facilities decoupled from vulnerable supply lines and infrastructure networks. MFCs can dispose of waste (sewage, food scraps, gray water, etc.) while producing clean water (up to 70 percent of required volumes) and power (up to 600 watts per person). Using relevance tree methodology, the research concludes that USAF research and development investment alone will not bring MFCs to fruition. A successful strategy for MFCs will be collaborative, addressing not only the technological barriers but also the key social, industrial, and political hurdles to enabling this capability....

Read More
  • Cover Image

Coles Cranes The Last Years 1960 - 1998 : A series of illustrated books about Coles Cranes., Book 2 of 2

By: Anthony James Kemp

In the second book of this series we pick up the story in the 1960s twenty years before the 100 yrars book was produced. We do this as the first book missed out a vital section in relation to the merger of Coles with Priestman Brothers. This merger began to show cracks in the industry and in management thinking at the time. This book has the advantage of hindsight but hopefully gets closer to the truth of what happened to the company. In such a large company there are many stories here is the basic story of what happened....

By the late 1960s Coles, which was at this time part of the company Steels Engineering Products Ltd, had three factories in the United Kingdom producing cranes. Sunderland. - This the “Crown Works” was the main factory where there was a range of cranes being produced, among them the Aeneas, Proteus, Argus, Vigorous, Illustrious, Centurion, Valiant, Ranger, Liea, Endurance, Doninant and Conqueror. Many of these were available in different option as mobile, lorry mounted, rail, semi and full tower units. Also the newly developed Hydra hydraulic cranes were beginning to make an impact and production increased. Glzenbuty. - This was the old factory of F. Taylor & Sons which was ending its lines of Jumbo and Jib carrier cranes Grantham. - This was where R H Neal Ltd had been in business since 1939, although incorporated into Coles they were still making a range of their own diesel mechanical cranes and a hydraulic Hymax hybrid. A new hydraulic introduced based on the Hydra truck was a rough terrain unit called the Husky, these would eventually become the sole production of this factory as the range extended and became a massive...

Read More
  • Cover Image

How to Build a Hay Box : Heat Retention Cooking

By: Center for Children in Need; Sabine Roper

2 Mill. women and children die every year from smoke from cooking fires! That is more than from HIV or Malaria! The smoke causes lung diseases and poisons the body. It is responsible for premature births and infants with a low birth weight. The hay box is a cheap and easy way to stay healthy and to save money at the same time. You live in Europe or America? Your way of cooking with electricity or Propane is very wasteful! Try to use a hay box and you will be less hot and can save money on your electricity or gas bill. The food is delicious because it cooks slowly and will save you a lot of work and time. You can't overcook it and it stays hot and doesn't need to be reheated. Instead of standing in front of your cook stove, you can do something productive, while your food cooks itself. less smell and more hygienic. Bacteria can't grow as the food is still piping hot after several hours. Extremely simple (and cheap) to make....

Read More
  • Cover Image

Indie Game Development with C# & XNA

By: Dan Violet Sagmiller

I've taught many college classes on game development. All the while had trouble selecting training materials. Eventually I started creating my own training materials. Class after class I would improve the content based on the students reactions/retention. Now I have a book that I used in my own classes....

Space Ghost: "Moltar, I have a gigantic brain, capable of turning any machine into a simple yes or no answer." Kathy Konfident: "Despite the fact that Space Ghost, immediately after, destroyed the machine he was working with, his description of AI (albeit accidental) was accurate. AI is simply turning an array of data into a simple yes or no question and acting on it."...

Who is this book for? Game Design Brain Storming Session Code Name & Genre 30 Second Commercial Why will the Game be Fun? Why will the Game Sell? Similar Game Comparison Player Stories Proofs Management The Roles The Team The Resources Keep it Fun Coding the Console Variables Decisions Loops While GUI Properties Window Load Event Buttons & Boxes Loops: For…Next Countdown… Score & Scope ListBox and TextBox Scrolling in Color Method to the Madness. Object Oriented Programming Programming with CLASS Class Variables and Variable Classes Generic List of For Each Overriding ToString Inheritance Interfaces Overriding Equals Overloading Methods Constructors Static Variables Overriding Operators Properties vs Variables Making the Game / Architecture Game Design Document To Sprint or to Waterfall? Sprint 1, Working Environment Sprint 2, Adding the Ship Sprint 3, Moving the Ship Sprint 4, Screen Lock the Ship Sprint 5, Add a Star Field Sprint 6, Shoot… Sprint 7, Thrust Sprint 8, a Challenger Appears Sprint 9, Target Practice Sprint 10, Polish the dust Sprint 11, Si...

Read More
  • Cover Image

The 100 Years History of Coles Cranes : A Series of Illustrated Books about Coles Cranes, Book 1 of 2

By: Anthony James Kemp

This first of 2 books is a reproduction of a promotional book given to clients and agents produced by Coles in 1979 called, “Coles 100 years - The growth story of Europe’s Leading Crane Manufacturer -1879 - 1979 ”. It was to celebrate the 100th anniversary of the establishment of the Coles Crane company by Henry James Cole in 1879. This book laid out the history of Coles from the foundation to the then present day 1979....

No records can be found relating to Henry Coles’ childhood until he left school at the age of 13, to be articled to S.Worssam and Co. (later called A. Ransome and Co.), who were manufacturers of sawmill equipment with premises on the King’s Road, Chelsea. He was with them for ten years, the first five in the drawing office, the remainder in tile company’s workshops. In 1870 he joined Maudslay, Sons and Field. He spent two years there as a marine engineer, erecting equipment on a Number of fighting ships including HMS Triumph and Swiftsure. Then, in 1872, he joined Appleby Bros, and in doing so made tile move which changed his life....

Read More
  • Cover Image

CSAT Occasional Paper No. 65 : Blue Horizons II; Future Capabilities and Technologies for the Air Force in 2030, Executive Summary

By: Col John P. Geis II, PhD, USAF

This study, Blue Horizons, was commissioned by the United States Air Force (USAF) chief of staff to provide “a new look at the future.” Specifically, the chief of staff asked the research team to provide “a common understanding of future strategic and technological trends for Air Force leaders to make better decisions.” The chief also sought to “confirm AU as [the Air Force’s] in-house think tank” and to improve the relevance of Air Force education to the decision making processes in Washington....

CHAPTER 1—Introduction . . . .1 Methodology . . . .1 Overview . . . . . .2 CHAPTER 2—alternate futures . . . . 3 Peer China . . . . .3 A Path toward a Peer China . . . .3 Peer China 2030—Causality and Impact . . . .6 Capabilities Needed to Respond to a Peer China Crisis . . . . .7 Resurgent Russia . . . . .8 The Development of a Resurgent Russia . . . .9 Capabilities to Defend against a Resurgent Russian State . . . . .10 Failed State—Nigeria . . . .11 A Failure We Cannot Ignore . . . .11 Nigeria Shatters . . . . .13 Capabilities Required for Intervention . . . .14 Jihadist Insurgency . . . . .15 Roots of the Schism . . . .16 The Insurgency . . . . 17 Capabilities Needed to Combat the Insurgency . . . 19 Operations Analysis Results . . . .20 Conclusions and Recommendations . . . .22 Recommendations . . . .26 The Way Ahead . . . . 28 Notes . . . . 29 TITLES IN THE OCCASIONAL PAPER SERIES . 37...

Read More
  • Cover Image

The Evolution of the Cruise Missile

By: Kenneth P. Werrell

Although cruise missiles are among the newest and most sophisticated weapons fielded by the United States, they possess a rich conceptual and technological heritage . It is important that we understand this heritage as we consider deployment and employment options . It is also important that we understand the developmental process illustrated by the history of the cruise missile. Without the perspective provided by this history, our perceptions of their purpose and use lack depth and insight....

Read More
  • Cover Image

AFDDEC Research Paper 2007-2, The Airpower Advantage in Future Warfare : The Need for Strategy

By: Colin S Gray

Technical innovation lies at the heart of the case for privileging airpower in the American way of war, but such innovation comprises only one of warfare’s seven vital contexts. The sheer complexity of war and warfare renders prediction, technological and other, a high-risk activity. The contexts of war and warfare are (1) political, (2) societal-cultural, (3)economic, (4) technological, (5) military-strategic, (6) geographical, and (7) historical....

DISCLAIMER . . . . . . . . . . . . . . . . . . . . . . .ii ABOUT THE AUTHOR . . . . . . . . . . . . . . . . .v SUMMARY . . . . . . . . . . . . . . . . . . . . . . . .vii THE AIRPOWER ADVANTAGE IN FUTURE WARFARE: THE NEED FOR STRATEGY . . . . . . .1 Plan of Attack . . . . . . . . . . . . . . . . . . . . . .3 Why this Study? . . . . . . . . . . . . . . . . . . . . 3 Airpower Theory . . . . . . . . . . . . . . . . . . . 8 Issues and Arguments . . . . . . . . . . . . . . .13 Future Warfare: Contextual Realities . . . . . 20 US Airpower Advantage in Future Warfare . . 30 NOTES . . . . . . . . . . . . . . . . . . . . . . . . . . 35...

Read More
  • Cover Image

The Public Domain : Enclosing the Commons of the Mind

By: James Boyle

Our music, our culture, our science, and our economic welfare all depend on a delicate balance between those ideas that are controlled and those that are free, between intellectual property and the public domain. In The Public Domain: Enclosing the Commons of the Mind (Yale University Press) James Boyle introduces readers to the idea of the public domain and describes how it is being tragically eroded by our current copyright, patent, and trademark laws. In a series of fascinating case studies, Boyle explains why gene sequences, basic business ideas and pairs of musical notes are now owned, why jazz might be illegal if it were invented today, why most of 20th century culture is legally unavailable to us, and why today's policies would probably have smothered the World Wide Web at its inception. Appropriately given its theme, the book will be sold commercially but also made available online for free under a Creative Commons license.(1.6MB PDF File) ...

Read More
  • Cover Image

CMMI High Maturity Hand Book

By: Vishnuvarthanan Moorthy

CMMI High Maturity is something every software organization is interested in! Attaining Maturity Level 5 rating means world class processes in place in that organization. Though it’s everyone’s interest, there is less details available in the world on how to practically implement CMMI ML5 and how to interpret the High Maturity practices. This book is an attempt to decode the high maturity practices with clear sample cases for all the High maturity process areas, there by connecting the dots of Implementation. This book explains the practicality of implementation of CMMI ML5 and has given specific guidance in many cases. Obviously it is not the whole of CMMI or the whole of everything, however may be this is the only book which offers highest possible insight in CMMI High Maturity Implementation. What it offers: • Complete guide as an End to End CMMI High Maturity Implementation • Practical interpretation of CMMI Practices • Sample cases covering CMMI Dev and CMMI SVC Models v1.3 • Basic Statistical Concepts Required for Implementing High Maturity • Clarity in definition and difference between important terms • Connects the E...

CMMI High Maturity Handbook Indian Edition Vishnuvarthanan Moorthy Copyright © 2015 Vishnuvarthanan Moorthy All rights reserved. DEDICATION TO THE SUPREME POWER!. CONTENTS 1 High Maturity an Introduction 1 2 Prerequisites for High Maturity Pg 5 3 Planning High Maturity Implementation Pg 8 4 SMART Business Objectives and Aligned Processes Pg 17 5 Measurement System and Process Performance Models Pg 29 6 Process Performance Baselines Pg 70 7 Define and Achieve Project Objectives and QPPOs Pg 93 8 Causal Analysis in Projects to Achieve Results Pg 113 9 Driving Innovation/Improvements to Achieve Results Pg 131 10 Succeeding in High Maturity Appraisals Pg 150 11 Reference Books, Links and Contributors Pg 154 1 HIGH MATURITY AN INTRODUCTION CMMI High Maturity Level is one of the Prestigious Rating any IT/ITES Companies would be interested in getting. The Maturity Level 4 and 5 achievement is considered as “High Maturity” since the Organizations understand their own process performance and its impact on Business performance. In addition, they bring world class pra...

High Maturity an Introduction 1 Prerequisites for High Maturity Pg 5 Planning High Maturity Implementation Pg 8 SMART Business Objectives and Aligned Processes Pg 17 Measurement System and Process Performance Models Pg 29 Process Performance Baselines Pg 70 Define and Achieve Project Objectives and QPPOs Pg 93 Causal Analysis in Projects to Achieve Results Pg 113 Driving Innovation/Improvements to Achieve Results Pg 131 Succeeding in High Maturity Appraisals Pg 150 Reference Books, Links and Contributors Pg 154 ...

Read More
  • Cover Image

CMMI Implementation Guide : A Practitioner's Persepective

By: Vishnuvarthanan Moorthy

The Book details on how to approach CMMI Implementation in an organization. It details out the various phases involved in CMMI Implementation and how to plan and execute them. It details on various aspects which we tend to overlook in CMMI Implementation. Who Should Read? • Organization looking forward to implement CMMI • Top Management person, trying to understand how to go about • SEPG, Program manager and Process Quality members • Anyone who is interested in understanding the Implementation of CMMI Why to Read? • To get complete End to End understanding on CMMI Implementation Lifecycle • Plan your budget, effort and resources for the program • Set your expectations clear on CMMI Implementation • Be aware of the different aspects in Implementation How it’s different: • Written from practitioners’ point of view • Communicates the reality in practical implementation Word of Caution: • The book contains only samples and typical examples and they are not comprehensive and to be verified and validated on a particular context for applicability ...

This CMMI Implementation Guide is a reference book for anyone interested in implementing CMMI in their organization. The purpose of this book is, to provide insight in to CMMI Implementation phases and best practices to be followed in this journey. Most of us agree, that CMMI is more a De facto model that IT Industry follows and other industries also has shown lot of interest in adopting this model. The day to day popularity and its adoption rate is on the surge for CMMI. In this scenario, this book will help the new organizations and implementers, on how to approach CMMI Implementation practically in their organization. This book is not a replacement to the Model or to the resources which CMMI Institute Publishes. This is only an additional resource which user can benefit from. CMMI Institute holds the complete authority and rights to CMMI model and all the components within the framework. This book is prepared based on the experience of a practitioner on implementing the model in various organizations. The Author has worked in multiple roles in CMMI Implementation and has global exposure in implementing the model. We reiterate ...

Contents Introduction to CMMI Initiating CMMI Implementation Planning CMMI Implementation Executing CMMI Implementation Appraising CMMI Implementation Sustaining CMMI Implementation CMMI High Maturity Implementation Miscellaneous References ...

Read More
  • Cover Image

Information Technology Tales

By: Brad Bradford

This book also begins with that wondrous first Information Technology and then moves on to tales about the wonders of the written word—great stories, many of them likely new to most readers. In them, you‘ll find all the backgrounds, foregrounds, premises, conclusions, and surprises that make up the best and most valuable books....

In the Bible, God‘s first gift to man isn‘t a lesson about how to make a fire or fashion a needle, a knife, or a spear. He first blesses him with language. Even before He takes Adam‘s rib to make Eve, He tells Adam to name every living creature. Adam immediately understands God‘s words and enunciates his own....

1. Did Water Monkeys Swim before We Spoke?-From whence cometh language, the InfoTech that lets us dominate our planet? We listen. We easily hallucinate word boundaries. Spaces, such as you see in writing, are absent from speech. Yet somehow we find it easy to make sense of speech. -- 2. The Gift of Memory-For millennia, mnemonics reigned over commerce, news, entertainment, and the perpetuation and refinement of crafts. -- 3. From Whence Cometh Indo-European Tongues?-Did a freshwater lake community flee a saltwater surge that filled the Black Sea and scatter its language west toward the Atlantic, southeast toward India, and northeast toward the Pacific? -- 4. Scripting Symbols of Shape-Scripting symbolic images lets man communicate over space and time. Balance of power shifts from tribal chiefs to city-state warrior-kings and priests. -- 5. Symbols of Sound Demand Analysis-The alphabet makes the pen mightier than the sword, generating the powers of knowledge needed to create and govern empires. -- 6. China‘s InfoTech Siblings-For centuries, the Chinese keep to themselves ?the wasps’ secret? and then develop printing blocks—the precur...

Read More
  • Cover Image

Multispace & Multistructure Neutrosophic Transdisciplinary : 100 Collected Papers of Sciences : Volume 4

By: Florentin Smarandache

The fourth volume, in my book series of “Collected Papers”, includes 100 published and unpublished articles, notes, (preliminary) drafts containing just ideas to be further investigated, scientific souvenirs, scientific blogs, project proposals, small experiments, solved and unsolved problems and conjectures, updated or alternative versions of previous papers, short or long humanistic essays, letters to the editors...

This short technical paper advocates a bootstrapping algorithm from which we can form a statistically reliable opinion based on limited clinically observed data, regarding whether an osteo-hyperplasia could actually be a case of Ewing’s osteosarcoma. The basic premise underlying our methodology is that a primary bone tumour, if it is indeed Ewing’s osteosarcoma, cannot increase in volume beyond some critical limit without showing metastasis. We propose a statistical method to extrapolate such critical limit to primary tumour volume. Our model does not involve any physiological variables but rather is entirely based on time series observations of increase in primary tumour volume from the point of initial detection to the actual detection of metastases....

Collected Eclectic Ideas - preface by the author.............................3 Contents....................................................6 ASTRONOMY..................................14 1. First Lunar Space Base, project proposal, by V. Christianto, Florentin Smarandache..15 2. On Recent Discovery of New Planetoids in the Solar System and Quantization of Celestial System, by V. Christianto, F. Smarandache..................28 3. Open and Solved Elementary Questions in Astronomy, by Florentin Smarandache.. 36 BIOLOGY......................................40 4. Statistical Modeling of Primary Ewing Tumors of the Bone, by Sreepurna Malakar, Florentin Smarandache, Sukanto Bhattacharya, in in , Vol. 3, No. JJ05, 81-88, 2005................41 CALCULUS....................................53 5. A Triple Inequality with Series and Improper Integrals, by Florentin Smarandache, in Bulletin of Pure and Applied Sciences, Vol. 25E, No. 1, 215-217, 2006.........54 6. Immediate Calculation of Some Poisson Type Integrals Using SuperMathematics Circular Ex-Centric Functions, by Florentin Smarandache & Mircea Eugen................................

Read More
  • Cover Image

Multispace & Multistructure Neutrosophic Transdisciplinary : 100 Collected Papers of Sciences : Volume 4

By: Florentin Smarandache

The fourth volume, in my book series of “Collected Papers”, includes 100 published and unpublished articles, notes, (preliminary) drafts containing just ideas to be further investigated, scientific souvenirs, scientific blogs, project proposals, small experiments, solved and unsolved problems and conjectures, updated or alternative versions of previous papers, short or long humanistic essays, letters to the editors...

This short technical paper advocates a bootstrapping algorithm from which we can form a statistically reliable opinion based on limited clinically observed data, regarding whether an osteo-hyperplasia could actually be a case of Ewing’s osteosarcoma. The basic premise underlying our methodology is that a primary bone tumour, if it is indeed Ewing’s osteosarcoma, cannot increase in volume beyond some critical limit without showing metastasis. We propose a statistical method to extrapolate such critical limit to primary tumour volume. Our model does not involve any physiological variables but rather is entirely based on time series observations of increase in primary tumour volume from the point of initial detection to the actual detection of metastases....

Collected Eclectic Ideas - preface by the author.............................3 Contents....................................................6 ASTRONOMY..................................14 1. First Lunar Space Base, project proposal, by V. Christianto, Florentin Smarandache..15 2. On Recent Discovery of New Planetoids in the Solar System and Quantization of Celestial System, by V. Christianto, F. Smarandache..................28 3. Open and Solved Elementary Questions in Astronomy, by Florentin Smarandache.. 36 BIOLOGY......................................40 4. Statistical Modeling of Primary Ewing Tumors of the Bone, by Sreepurna Malakar, Florentin Smarandache, Sukanto Bhattacharya, in in , Vol. 3, No. JJ05, 81-88, 2005................41 CALCULUS....................................53 5. A Triple Inequality with Series and Improper Integrals, by Florentin Smarandache, in Bulletin of Pure and Applied Sciences, Vol. 25E, No. 1, 215-217, 2006.........54 6. Immediate Calculation of Some Poisson Type Integrals Using SuperMathematics Circular Ex-Centric Functions, by Florentin Smarandache & Mircea Eugen................................

Read More
       
3
|
4
|
5
|
6
|
7
Records: 101 - 120 of 131 - Pages: 
 
 





Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.